{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:34:59Z","timestamp":1725543299695},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540354376"},{"type":"electronic","value":"9783540354383"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11767480_24","type":"book-chapter","created":{"date-parts":[[2006,7,4]],"date-time":"2006-07-04T01:21:27Z","timestamp":1151976087000},"page":"349-364","source":"Crossref","is-referenced-by-count":2,"title":["W3Bcrypt: Encryption as a Stylesheet"],"prefix":"10.1007","author":[{"given":"Angelos","family":"Stavrou","sequence":"first","affiliation":[]},{"given":"Michael E.","family":"Locasto","sequence":"additional","affiliation":[]},{"given":"Angelos D.","family":"Keromytis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","unstructured":"Anupam, V., Mayer, A.: Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies. In: Proceedings of the 7th USENIX Security Symposium (January 1998)"},{"key":"24_CR2","unstructured":"Brumley, D., Boneh, D.: Remote Timing Attacks Are Practical. In: Proceedings of the 12th USENIX Security Symposium (August 2003)"},{"key":"24_CR3","unstructured":"Chou, N., Ledesma, R., Teraguchi, Y., Mitchell, J.C.: Client\u2013side Defense Against Web\u2013based Identity Theft. In: 11th Annual Network and Distributed System Security Symposium (NDSS 2004) (February 2004)"},{"key":"24_CR4","unstructured":"Coarfa, C., Druschel, P., Wallach, D.S.: Performance Analysis of TLS Web Servers. In: 9th Annual Network and Distributed System Security Symposium (NDSS 2002) (February 2002)"},{"key":"24_CR5","unstructured":"Dean, D., Stubblefield, A.: Using Client Puzzles to Protect TLS. In: Proceedings of the 10th USENIX Security Symposium (August 2001)"},{"key":"24_CR6","unstructured":"Wenning, R., et al.: Platform for Privacy Preferences (P3P) Project (September 2005), \n                    \n                      http:\/\/www.w3.org\/P3P\/"},{"key":"24_CR7","unstructured":"Gregorio, J.: Secure RSS Syndication (July 2005), \n                    \n                      http:\/\/www.xml.com\/pub\/a\/2005\/07\/13\/secure-rss.html"},{"key":"24_CR8","unstructured":"Gupta, V., Stebila, D., Fung, S., Shantz, S.C., Gura, N., Eberle, H.: Speeding Up Secure Web Transactions Using Elliptic Curve Cryptography. In: 11th Annual Network and Distributed System Security Symposium (NDSS 2004) (August 2004)"},{"key":"24_CR9","unstructured":"Imamura, T., Dillaway, B., Simon, E.: XML Encryption Syntax and Processing (2002), \n                    \n                      http:\/\/www.w3.org\/TR\/xmlenc-core\/"},{"key":"24_CR10","unstructured":"Imamura, T., Maruyama, H.: Specification of Element-wise XML Encryption (2000), \n                    \n                      http:\/\/lists.w3.org\/Archives\/Public\/xml-encryption\/2000Aug\/att-0005\/xmlenc-spec.html"},{"key":"24_CR11","unstructured":"Ioannidis, S., Bellovin, S.M.: Building a Secure Web Browser. In: Freenix Annual Technical Conference (USENIX 2001) (June 2001)"},{"key":"24_CR12","unstructured":"Lesniewski-Laas, C., Kaashoek, M.F.: SSL Splitting: Securely Serving Data From Untrusted Caches. In: Proceedings of the 12th USENIX Security Symposium (August 2003)"},{"key":"24_CR13","unstructured":"Maruyama, H., Imamura, T. (eds.): Element-Wise XML Encryption (2000), \n                    \n                      http:\/\/lists.w3.org\/Archives\/Public\/xml-encryption\/2000Apr\/att-0005\/01-%xmlenc"},{"key":"24_CR14","unstructured":"Rescorla, E., Cain, A., Korver, B.: SSLACC: A Clustered SSL Accelerator. In: Proceedings of the 11th USENIX Security Symposium (August 2002)"},{"key":"24_CR15","unstructured":"Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J.C.: Stronger Password Authentication Using Browser Extensions. In: Proceedings of the 14th USENIX Security Symposium, August 2005, pp. 17\u201332 (2005)"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Sekar, R., Ramakrishnan, C., Ramakrishnan, I., Smolka, S.: Model-Carrying Code (MCC): A New Paradigm for Mobile-Code Security. In: Proceedings of the New Security Paradigms Workshop (NSPW) (September 2001)","DOI":"10.1145\/508171.508175"},{"key":"24_CR17","unstructured":"Ye, Z., Smith, S.: Trusted Paths for Browsers. In: Proceedings of the 11th USENIX Security Symposium (August 2002)"}],"container-title":["Lecture Notes in Computer Science","RoboCup 2005: Robot Soccer World Cup IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11767480_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T22:08:57Z","timestamp":1552342137000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11767480_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540354376","9783540354383"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11767480_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}